Copiale cipher

Last updated
Copiale cipher
private collection
Copiale-cipher09s.png
Pages 16–17
Type codex
Date1730s
Place of origin Wolfenbüttel
Language(s)German, encrypted in abstract symbols, Greek and Roman letters
Author(s)Oculist secret society
Size105 pages
ContentsOculist initiation ceremony
OtherDeciphered in 2011

The Copiale cipher is an encrypted manuscript consisting of 75,000 handwritten characters filling 105 pages in a bound volume. [1] Undeciphered for more than 260 years, the document was decrypted in 2011 with computer assistance. An international team consisting of Kevin Knight of the University of Southern California Information Sciences Institute and Viterbi School of Engineering, along with Beáta Megyesi and Christiane Schaefer of Uppsala University in Sweden, found the cipher to be an encrypted German text. The manuscript is a homophonic cipher that uses a complex substitution code, including symbols and letters, for its text and spaces. [2]

Contents

Previously examined by scientists at the German Academy of Sciences at Berlin in the 1970s, the cipher was thought to date from between 1760 and 1780. [3] Decipherment revealed that the document had been created in the 1730s by a secret society [1] [2] [4] called the "high enlightened (Hocherleuchtete) oculist order" [5] of Wolfenbüttel, [6] or Oculists. [5] [7] [8] The Oculists used sight as a metaphor for knowledge. [9]

The manuscript is in a private collection. [1] A parallel manuscript is kept at the Staatsarchiv Wolfenbüttel. [5]

The Copiale cipher includes abstract symbols, as well as letters from Greek and most of the Roman alphabet. The only plain text in the book is "Copiales 3" at the end and "Philipp 1866" on the flyleaf. Philipp is thought to have been an owner of the manuscript. [5] The plain-text letters of the message were found to be encoded by accented Roman letters, Greek letters and symbols, with unaccented Roman letters serving only to represent spaces.

The researchers found that the initial 16 pages describe an Oculist initiation ceremony. The manuscript portrays, among other things, an initiation ritual in which the candidate is asked to read a blank piece of paper and, on confessing inability to do so, is given eyeglasses and asked to try again, and then again after washing the eyes with a cloth, followed by an "operation" in which a single eyebrow hair is plucked. [10]

Substitution cipher

The Copiale cipher is a substitution cipher. It is not a 1-for-1 substitution but rather a homophonic cipher: each ciphertext character stands for a particular plaintext character, but several ciphertext characters may encode the same plaintext character. For example, all the unaccented Roman characters encode a space. Seven ciphertext characters encode the single letter "e". In addition, some ciphertext characters stand for several characters or even a word. One ciphertext character ("†") encodes "sch", and another encodes the secret society's name. [5] [10]

Decryption method

One naturally wonders if the problem of translation could conceivably be treated as a problem in cryptography. When I look at an article in Russian, I say: 'This is really written in English, but it has been coded in some strange symbols. I will now proceed to decode.

Warren Weaver, Letter to Norbert Wiener, March 4, 1947

A machine translation expert, Knight approached language translation as if all languages were ciphers, effectively treating foreign words as symbols for English words. His approach, which tasked an expectation-maximization algorithm with generating every possible match of foreign and English words, enabled the algorithm to figure out a few words with each pass. A comparison with 80 languages confirmed that the original language was likely German, which the researchers had guessed based on the word "Philipp," a German spelling. Knight then used a combination of intuition and computing techniques to decipher most of the code in a few weeks. Megyesi later realized that a particular symbol meant "eye", and Schaefer connected that discovery to the Oculists.

The Oculists

The Oculists were a group of ophthalmologists led by Count Friedrich August von Veltheim, who died in April 1775. The Philipp 1866 Copiales 3 document, however, appears to suggest that the Oculists, or at least Count Veltheim, were a group of Freemasons who created the Oculist society in order to pass along the Masonic rites [7] [11] which had recently been banned by Pope Clement XII.

See also

Related Research Articles

<span class="mw-page-title-main">Cipher</span> Algorithm for encrypting and decrypting information

In cryptography, a cipher is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment. To encipher or encode is to convert information into cipher or code. In common parlance, "cipher" is synonymous with "code", as they are both a set of steps that encrypt a message; however, the concepts are distinct in cryptography, especially classical cryptography.

<span class="mw-page-title-main">Cryptanalysis</span> Study of analyzing information systems in order to discover their hidden aspects

Cryptanalysis refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.

<span class="mw-page-title-main">Voynich manuscript</span> 15th century codex in an unknown script

The Voynich manuscript is an illustrated codex, hand-written in an unknown script referred to as 'Voynichese.' The vellum on which it is written has been carbon-dated to the early 15th century (1404–1438). Stylistic analysis has indicated the manuscript may have been composed in Italy during the Italian Renaissance. While the origins, authorship, and purpose of the manuscript are still debated, hypotheses range from a script for a natural language or constructed language, an unread code, cypher, or other form of cryptography, or perhaps a hoax, reference work, or work of fiction currently lacking the translation(s) and context needed to both properly entertain or eliminate any of these possibilities.

In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters, pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution process to extract the original message.

<span class="mw-page-title-main">Transposition cipher</span> Method of encryption

In cryptography, a transposition cipher is a method of encryption which scrambles the positions of characters (transposition) without changing the characters themselves. Transposition ciphers reorder units of plaintext according to a regular system to produce a ciphertext which is a permutation of the plaintext. They differ from substitution ciphers, which do not change the position of units of plaintext but instead change the units themselves. Despite the difference between transposition and substitution operations, they are often combined, as in historical ciphers like the ADFGVX cipher or complex high-quality encryption methods like the modern Advanced Encryption Standard (AES).

<span class="mw-page-title-main">Caesar cipher</span> Simple and widely known encryption technique

In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code, or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.

<span class="mw-page-title-main">Vigenère cipher</span> Simple type of polyalphabetic encryption system

The Vigenère cipher is a method of encrypting alphabetic text where each letter of the plaintext is encoded with a different Caesar cipher, whose increment is determined by the corresponding letter of another text, the key.

<span class="mw-page-title-main">Ciphertext</span> Encrypted information

In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it. This process prevents the loss of sensitive information via hacking. Decryption, the inverse of encryption, is the process of turning ciphertext into readable plaintext. Ciphertext is not to be confused with codetext because the latter is a result of a code, not a cipher.

<span class="mw-page-title-main">Arne Beurling</span> Swedish mathematician

Arne Carl-August Beurling was a Swedish mathematician and professor of mathematics at Uppsala University (1937–1954) and later at the Institute for Advanced Study in Princeton, New Jersey. Beurling worked extensively in harmonic analysis, complex analysis and potential theory. The "Beurling factorization" helped mathematical scientists to understand the Wold decomposition, and inspired further work on the invariant subspaces of linear operators and operator algebras, e.g. Håkan Hedenmalm's factorization theorem for Bergman spaces.

<span class="mw-page-title-main">Lorenz cipher</span> Cipher machines used by the German Army during World War II

The Lorenz SZ40, SZ42a and SZ42b were German rotor stream cipher machines used by the German Army during World War II. They were developed by C. Lorenz AG in Berlin. The model name SZ was derived from Schlüssel-Zusatz, meaning cipher attachment. The instruments implemented a Vernam stream cipher.

A straddling checkerboard is a device for converting an alphanumeric plaintext into digits whilst simultaneously achieving fractionation and data compression relative to other schemes using digits. It also is known as a monôme-binôme cipher.

<i>Kryptos</i> Encrypted sculpture by American artist Jim Sanborn

Kryptos is a distributed sculpture by the American artist Jim Sanborn located on the grounds of the Central Intelligence Agency (CIA) headquarters, the George Bush Center for Intelligence in Langley, Virginia.

In cryptography, the ADFGVX cipher was a manually applied field cipher used by the Imperial German Army during World War I. It was used to transmit messages secretly using wireless telegraphy. ADFGVX was in fact an extension of an earlier cipher called ADFGX which was first used on 1 March 1918 on the German Western Front. ADFGVX was applied from 1 June 1918 on both the Western Front and Eastern Front.

Gilbert Sandford Vernam was a Worcester Polytechnic Institute 1914 graduate and AT&T Bell Labs engineer who, in 1917, invented an additive polyalphabetic stream cipher and later co-invented an automated one-time pad cipher. Vernam proposed a teleprinter cipher in which a previously prepared key, kept on paper tape, is combined character by character with the plaintext message to produce the ciphertext. To decipher the ciphertext, the same key would be again combined character by character, producing the plaintext. Vernam later worked for the Postal Telegraph Company, and became an employee of Western Union when that company acquired Postal in 1943. His later work was largely with automatic switching systems for telegraph networks.

In cryptography, a classical cipher is a type of cipher that was used historically but for the most part, has fallen into disuse. In contrast to modern cryptographic algorithms, most classical ciphers can be practically computed and solved by hand. However, they are also usually very simple to break with modern technology. The term includes the simple systems used since Greek and Roman times, the elaborate Renaissance ciphers, World War II cryptography such as the Enigma machine and beyond.

<span class="mw-page-title-main">M-209</span> Mechanical cipher machine

In cryptography, the M-209, designated CSP-1500 by the United States Navy is a portable, mechanical cipher machine used by the US military primarily in World War II, though it remained in active use through the Korean War. The M-209 was designed by Swedish cryptographer Boris Hagelin in response to a request for such a portable cipher machine, and was an improvement of an earlier machine, the C-36.

<span class="mw-page-title-main">Jefferson disk</span> Cipher system invented by Thomas Jefferson

The Jefferson disk, also called the Bazeries cylinder or wheel cypher, was a cipher system commonly attributed to Thomas Jefferson that uses a set of wheels or disks, each with letters of the alphabet arranged around their edge in an order, which is different for each disk and is usually ordered randomly.

<span class="mw-page-title-main">Pigpen cipher</span> Type of substitution cipher

The pigpen cipher is a geometric simple substitution cipher, which exchanges letters for symbols which are fragments of a grid. The example key shows one way the letters can be assigned to the grid.

<span class="mw-page-title-main">Cipher disk</span> Encryption and decryption tool consisting of two metal plates with alphabets

A cipher disk is an enciphering and deciphering tool developed in 1470 by the Italian architect and author Leon Battista Alberti. He constructed a device, consisting of two concentric circular plates mounted one on top of the other. The larger plate is called the "stationary" and the smaller one the "moveable" since the smaller one could move on top of the "stationary".

<span class="mw-page-title-main">BATCO</span> British paper cryptographic system

BATCO, short for Battle Code, is a hand-held, paper-based encryption system used at a low, front line level in the British Army. It was introduced along with the Clansman combat net radio in the early 1980s and was largely obsolete by 2010 due to the wide deployment of the secure Bowman radios. BATCO consists of a code, contained on a set of vocabulary cards, and cipher sheets for superencryption of the numeric code words. The cipher sheets, which are typically changed daily, also include an authentication table and a radio call sign protection system.

References

  1. 1 2 3 "Computer Scientist Cracks Mysterious 'Copiale Cipher'". American Association for the Advancement of Science. October 25, 2011.
  2. 1 2 New York Times: John Markoff, "How revolutionary tools cracked a 1700s code," October 24, 2011, retrieved October 25, 2011
  3. "Rätsel nach 250 Jahren gelöst: Forscher entschlüsseln mysteriöse Geheimschrift". bild.de. 27 October 2011. Retrieved May 13, 2020.
  4. Archived 2011-11-12 at the Wayback Machine (the complete proceedings) or (the relevant presentation): Knight, Kevin, Megyesi, Beáta and Schaefer, Christiane "The Copiale Cipher," Proceedings of the 4th Workshop on building and using comparable corpora, pages 2–9, 49th Annual Meeting of the Association for Comparable Linguistics, 24 June 2011. Retrieved October 25, 2011
  5. 1 2 3 4 5 Knight, Kevin; Megyesi, Beáta; Schaefer, Christiane (2011). "The Copiale Cipher". Uppsala Universitet, Institutionen för lingvistik och filologi website. Retrieved 2011-10-25. Includes images of the full text, as well as full translations in German and English.
  6. Henning, Aloys "Eine frühe Loge des 18. Jahrhunderts: 'Die Hocherleuchtete Oculisten-Gesellschaft' in Wolfenbüttel", in: Europa in der frühen Neuzeit, Festschrift für Günter Mühlpfordt 5, Aufklärung in Europa, hg. Erich Donnert, Köln/Weimar/Wien 1999, S. 65–82.
  7. 1 2 Shactman, Noah (16 November 2012). "They Cracked This 250-Year-Old Code, and Found a Secret Society Inside". Wired . Vol. 20, no. 12. Retrieved 2 November 2013.
  8. USC Scientist Cracks Mysterious "Copiale Cipher" on YouTube, on the official USC channel.
  9. Shachtman, Noah (Nov 16, 2012). "They Cracked This 250-Year-Old Code, and Found a Secret Society Inside". Wired. Vol. 20, no. 12. Retrieved May 13, 2020 via www.wired.com.
  10. 1 2 Boyle, Alan (October 25, 2011). "Secret society's code cracked". MSNBC. Archived from the original on November 2, 2011. Retrieved October 25, 2011.
  11. James D. Hodgkins (April 2012). "The Copiale Cipher: An Early German Masonic Ritual Unveiled". scottishrite.org. Retrieved 1 July 2018.